Call for Papers
3rd Workshop on Ethics in Computer Security Research
March 2, 2012
Divi Flamingo Beach Resort, Bonaire
http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html
Computer security often leads to discovering interesting new problems and
challenges. The challenge still remains to follow a path acceptable for
Institutional Review Boards at academic institutions, as well as compatible
with ethical guidelines for professional societies or government institutions.
However, no exact guidelines exist for computer security research yet. This
workshop will bring together computer security researchers, practitioners,
policy makers, and legal experts.
This workshop solicits submissions describing or suggesting ethical and
responsible conduct in computer security research. While we focus on setting
standards and sharing prior experiences and experiments in computer security
research, successful or not, we tap into research behavior in network security,
computer security, applied cryptography, privacy, anonymity, and security
economics.
This workshop will favor discussions among participants, in order to shape the
future of ethical standards in the field. It will be co-located with the
Sixteenth International Conference on Financial Cryptography and Data Security
2012.
Submissions
We solicit submissions in three categories.
1. Position papers. Submitted papers must not substantially overlap with papers
that have been published or that are simultaneously submitted to a journal or
conference with proceedings. Position paper submission should not exceed 6
pages in length, excluding bibliography and well-marked appendices.
2. Case studies. Submitted case studies must not substantially overlap with
papers that have been published or that are simultaneously submitted to a
journal or conference with proceedings. Submitted case studies should not
exceed 12 pages in length, excluding bibliography and well-marked appendices.
3. Panel proposals. Submitted panel proposals should list the panel topic, a
moderator, and a list of confirmed panelists, along with a short biography of
the participants. The composition should be adequately selected as to generate
copious discussion. Panelists will be given an opportunity to submit a position
statement for the final proceedings.
The proceedings will be published in the Springer LNCS series (both the 2010
and 2011 proceedings were published in Springer LNCS). More information on how
to submit your work via the EasyChair system can be found at
http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html
Organization:
Program Chair: Sven Dietrich, Stevens Institute of Technology
Program Committee:
John Aycock, University of Calgary
Michael Bailey, University of Michigan
Elizabeth Buchanan, University of Wisconsin-Stout
Aaron Burstein
Jon Callas, Indiana University
Michael Collins, RedJack
Nicolas Christin, Carnegie Mellon University
Marc Dacier, Symantec Research
Rachna Dhamija, Harvard University
David Dittrich, University of Washington APL
Roger Dingledine, The Tor Project
Ken Fleischmann, University of Maryland
Maritza Johnson, Columbia University
Erin Kenneally, UC San Diego/CAIDA/Elchemy
Engin Kirda, Northeastern University
Christian Kreibich, ICSI
John McHugh, UNC/RedJack
Howard Lipson, CERT
Perry E. Metzger, University of Pennsylvania
M. Angela Sasse, University College London
Angelos Stavrou, George Mason University
Michael Steinmann, Stevens Institute of Technology
Lenore Zuck, University of Illinois at Chicago
--
Sven Dietrich Stevens Institute of Technology
Assistant Professor Castle Point on Hudson
Computer Science Dept Hoboken, NJ 07030, USA
spock at cs.stevens.edu T: +1-201-216-8078 F: +1-201-216-8249